DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
75afef89a79d5775e53f6cdb9060ac27839aab0c9b0db1ea26996465fc364eb8.dll
Resource
win7-20220812-en
Target
75afef89a79d5775e53f6cdb9060ac27839aab0c9b0db1ea26996465fc364eb8
Size
132KB
MD5
0576e45a28314868d84d78a144e5d030
SHA1
7129f2d497a0c142347e90a45cb03106ed4a6cc2
SHA256
75afef89a79d5775e53f6cdb9060ac27839aab0c9b0db1ea26996465fc364eb8
SHA512
315a13dd15d97ec3beafc6acf6258389e079a1f3995c782d6a8fa55ce556677106e90427865cc23e01d801bbc69c68d116e4ac1959630d036f64759dba59839c
SSDEEP
3072:wUjuRG5V2TIp4dHK+zhqGIiHUQR9UbZwalwMZbXfAPM:bDoqjeHhUzXYU
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
CloseHandle
GetLastError
CreateFileA
GetFileSize
ReadFile
SetFilePointer
WriteFile
ResumeThread
CreateThread
WaitForSingleObject
CopyFileA
DeleteFileA
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
SetEndOfFile
SetConsoleCtrlHandler
LoadLibraryA
GetStringTypeW
GetStringTypeA
LCMapStringW
LeaveCriticalSection
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetStdHandle
UnhandledExceptionFilter
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetCurrentThread
TlsGetValue
SetLastError
TlsFree
TlsAlloc
TlsSetValue
GetProcAddress
RtlUnwind
FatalAppExitA
IsBadWritePtr
DeleteCriticalSection
InitializeCriticalSection
lstrcmpiA
WideCharToMultiByte
DisableThreadLibraryCalls
GetModuleFileNameA
OutputDebugStringA
MultiByteToWideChar
GetCurrentThreadId
lstrlenW
LCMapStringA
Sleep
InterlockedExchange
HeapAlloc
HeapFree
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
HeapReAlloc
HeapSize
GetModuleHandleA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
GetLocaleInfoW
SetWindowsHookExA
GetClassNameA
PostMessageA
CallNextHookEx
UnhookWindowsHookEx
GetWindowLongA
SysStringLen
LoadRegTypeLi
SysAllocStringLen
VariantCopy
VariantChangeType
VariantClear
SysFreeString
SysAllocString
inet_addr
htonl
gethostbyname
getpeername
getsockname
inet_ntoa
closesocket
shutdown
listen
bind
setsockopt
socket
accept
select
connect
ioctlsocket
__WSAFDIsSet
send
recv
recvfrom
sendto
htons
ord16
ord30
ord58
ord32
ord57
ord18
ord15
ord21
ord23
ord31
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ